Security Using Physical Objects
First Claim
1. A method for controlling access to secured content in a computing system, comprising the steps of:
- receiving a user request to create a security pattern to restrict access to content;
prompting the user to place one or more security objects against a display of the computer system;
detecting an outline shape of a security object placed against the display; and
recording the outline shape as a security pattern to restrict future access to the content.
2 Assignments
0 Petitions
Accused Products
Abstract
A password-type security system may be employed using the placement of physical objects as a security pattern that is to be matched before access to secured content is granted. The system may be implemented on a computing system that uses a display that can detect, e.g., via optical circuitry, the visual characteristics of the display surface. The system can visually detect the placement of objects, their orientations, locations, color, printed patterns, etc. The user may define a security pattern as comprising one or more objects placed at locations on the screen, or at a predetermined rotation angle. The outline shape of an object may be treated as a required pattern, such that access to secured content is permitted only if the object having that outline shape is detected on the display surface. Similarly, printed patterns on objects may also be detected and used as part of security patterns.
131 Citations
20 Claims
-
1. A method for controlling access to secured content in a computing system, comprising the steps of:
-
receiving a user request to create a security pattern to restrict access to content; prompting the user to place one or more security objects against a display of the computer system; detecting an outline shape of a security object placed against the display; and recording the outline shape as a security pattern to restrict future access to the content. - View Dependent Claims (2, 3, 4, 5, 6, 8)
-
-
9. A method of controlling access to secured content, comprising the steps of:
-
receiving a user request to create a security pattern to restrict access to content; prompting the user to place one or more security objects against a display of the computer system; detecting the placement of a plurality of objects against said display after said prompting; displaying an attribute menu adjacent to each of said plurality of objects, wherein said menu offers the user the options of ignoring the adjacent object in the security pattern and including one or more detected attributes of the adjacent object in the security pattern. - View Dependent Claims (10, 11, 12, 13)
-
-
14. One or more computer-readable media storing computer-executable instructions for performing the steps of:
-
receiving a user request to access restricted content; prompting said user to place a plurality of objects on top of a tabletop display in a predefined security pattern; causing said tabletop display to scan the display'"'"'s surface and detect objects placed thereon; determining whether said security pattern is satisfied by said plurality of objects; and granting access to said restricted content if said security pattern is satisfied. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification